General

  • Target

    ddafa2b44ec908b114a4c33431e0952a_JaffaCakes118

  • Size

    465KB

  • Sample

    241210-jgsvmstqbj

  • MD5

    ddafa2b44ec908b114a4c33431e0952a

  • SHA1

    e85c3f28cd859c6b5ab900c6a0c07a8fcfde8173

  • SHA256

    4ca6a48021d7d442d9311b158691b1f219576d7d37a99f64741463659903ad4c

  • SHA512

    4a3e227d44ad1cd9d6402e3bbde1ecc51196a7d8325f808bd6ba05059a6f596edf82f0ce2b359daa61267f6fcd08dc994549a6b06aec0cda1480ec14ab3efd87

  • SSDEEP

    6144:UEuRQAx7F0oJbIkfS6yLURmB2kC1iQvOhWfVqh9HZZzALTfj9H7C80kDq8a5O+F:Y+Ax7DJ69251VYWfVgH837e6AFzdp

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

weni

Decoy

sdmdwang.com

konversationswithkoshie.net

carap.club

eagldeream.com

856380585.xyz

elgallocoffee.com

magetu.info

lovertons.com

theichallenge.com

advancedautorepairsonline.com

wingsstyling.info

tapdaugusta.com

wiloasbanhsgtarewdasc.solutions

donjrisdumb.com

experienceddoctor.com

cloverhillconsultants.com

underwear.show

karensgonewild2020.com

arodsr.com

thefucktardmanual.com

Targets

    • Target

      ddafa2b44ec908b114a4c33431e0952a_JaffaCakes118

    • Size

      465KB

    • MD5

      ddafa2b44ec908b114a4c33431e0952a

    • SHA1

      e85c3f28cd859c6b5ab900c6a0c07a8fcfde8173

    • SHA256

      4ca6a48021d7d442d9311b158691b1f219576d7d37a99f64741463659903ad4c

    • SHA512

      4a3e227d44ad1cd9d6402e3bbde1ecc51196a7d8325f808bd6ba05059a6f596edf82f0ce2b359daa61267f6fcd08dc994549a6b06aec0cda1480ec14ab3efd87

    • SSDEEP

      6144:UEuRQAx7F0oJbIkfS6yLURmB2kC1iQvOhWfVqh9HZZzALTfj9H7C80kDq8a5O+F:Y+Ax7DJ69251VYWfVgH837e6AFzdp

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader family

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks